CISA unveils government cyber security response playbooks

Playbook follows President Biden's April executive order

Hand hovering over laptop with padlock graphic superimposed

CISA has published two playbooks for federal civilian agencies to plan and conduct cyber security vulnerability and incident response.

The Federal Government Cybersecurity Incident and Vulnerability Response Playbooks follow an executive order from President Biden in May urging the US to improve its cyber security measures following a series of data breaches in critical infrastructure and federal agencies, including the SolarWinds supply chain attack and the ransomware attacks on the Colonial pipeline.

The order from Biden urged better lines of communication between law enforcement and service providers to enhance investigations.

CISA said the playbooks should provide federal civilian agencies with a standard set of procedures to respond to vulnerabilities and incidents impacting Federal Civilian Executive Branch networks.   

“The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from vulnerabilities and incidents affecting their systems,” said Matt Hartman, deputy executive assistant director for Cybersecurity. 

“This important step, set in motion by President Biden’s Cyber Executive Order, will enable more comprehensive analysis and mitigation of vulnerabilities and incidents across the civilian enterprise. We encourage our public and private sector partners to review the playbooks to take stock of their own vulnerability and incident response practices.” 

Related Resource

Tactics to overcome supply chain shocks and risks

Build better resiliency with modern IT infrastructure

Blue cover with whitepaper title, with a white triangle in the bottom half of the coverFree download

Two playbooks outlined by CIS are for incident and vulnerability response. They should give agencies a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting systems, data, and networks. They also contain checklists for incident response, incident response preparation, and vulnerability response that can be adapted to any organization to track necessary activities to completion.    

CISA said the “Incident Response Playbook” applies to incidents involving confirmed malicious cyber activity and for which a major incident has been declared or not yet been reasonably ruled out. The “Vulnerability Response Playbook” applies to any vulnerability observed to be used by adversaries to gain unauthorized entry into computing resources. 

“Agencies should use these playbooks to help shape overall defensive cyber operations to ensure consistent and effective response and coordinated communication of response activities,” CISA said.

The playbooks also cover response activities, such as malicious activity detection or vulnerability discovery initiated by federal agencies, CISA, or third parties. CISA warned the playbooks don’t cover threats to classified data or national security systems.

Featured Resources

Modern governance: The how-to guide

Equipping organisations with the right tools for business resilience

Free Download

Cloud operational excellence

Everything you need to know about optimising your cloud operations

Watch now

A buyer’s guide to board management software

How the right software can improve your board’s performance

The real world business value of Oracle autonomous data warehouse

Lead with a 417% five-year ROI

Download now

Recommended

Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
Five things to consider before choosing an MFA solution
Security

Five things to consider before choosing an MFA solution

17 Dec 2021
Australia and US sign CLOUD Act data-sharing deal to support criminal investigations
cyber crime

Australia and US sign CLOUD Act data-sharing deal to support criminal investigations

16 Dec 2021

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
How to speed up Windows 11
Microsoft Windows

How to speed up Windows 11

7 Jan 2022
Dell XPS 15 (2021) review: The best just got better
Laptops

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022